Essay about Unit almost eight Assignment two Network Reliability Applications and Countermeasusures

Unit almost eight Answer Piece

Given the network protection applications and countermeasures in the first column of the table below, explore answers to the following concerns: * Wherever does the countermeasure belong inside the seven websites of a typical THAT infrastructure? 5. What CIA functions does the countermeasure give?

Provide your answers in the table listed below.

Network Protection Applications and Countermeasures | Domains | CIA Function | Ethical hacker | * Workstation domain | Availability

Intrusion recognition system/intrusion elimination system (IDS/IPS) | 2. System/Application website * Remote access domain name * LAN-to-WAN domain | Integrity | Access regulates | 5. LAN-to-WAN domain name * WAN domain | Confidentiality | Failover server | 2. WAN site * LAN-to-WAN domain | Availability | Automatic updates | 2. Workstation site | Supply

Cryptography | * LAN-to-WAN site | Privacy

Data backups | * System/Application domain | Availability

Logon rights | 2. LAN domain name | Sincerity

Computer system cluster | * Workstation domain | Integrity

Firewalls | * LAN domain | Confidentiality

Proxies | * LAN-to-WAN domain | Integrity Confidentiality

Anti-virus scanners | * Workstation domain | Confidentiality | As a reminder, the seven domains of a typical THIS infrastructure range from the following domain names: * End user domain: Genuine users

* Workstation website: Workstations, laptop computers, and end-point devices, such as smart phones and printers 2. LAN domain: Physical and logical LAN technologies—100 Mbps/1000 Mbps changed Ethernet, 802. 11-family of wireless LAN technologies—used to back up workstation connection to the company network infrastructure * LAN-to-WAN domain: Routers, firewalls, demilitarized zones (DMZs), and IDS/IPS * WAN domain: Routers, circuits, buttons, firewalls, gateways, and equivalent gear for remote spots, sometimes under a managed assistance offering by service provider 2. Remote access domain: Virtual private networks (VPNs), notebook computers with VPN...